CN111860723A - Terminal management method based on two-dimensional code - Google Patents
Terminal management method based on two-dimensional code Download PDFInfo
- Publication number
- CN111860723A CN111860723A CN202010714490.7A CN202010714490A CN111860723A CN 111860723 A CN111860723 A CN 111860723A CN 202010714490 A CN202010714490 A CN 202010714490A CN 111860723 A CN111860723 A CN 111860723A
- Authority
- CN
- China
- Prior art keywords
- dimensional code
- software
- management
- serial number
- computer equipment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000007726 management method Methods 0.000 title claims abstract description 60
- 238000012795 verification Methods 0.000 claims description 4
- 230000009191 jumping Effects 0.000 claims description 3
- 238000000034 method Methods 0.000 claims description 3
- 238000004806 packaging method and process Methods 0.000 claims description 3
- 238000013475 authorization Methods 0.000 abstract description 3
- 238000005336 cracking Methods 0.000 abstract description 2
- 230000007547 defect Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 239000011159 matrix material Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
- G06K17/0025—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/105—Arrangements for software license management or administration, e.g. for managing licenses at corporate level
Abstract
The invention relates to a terminal management method, in particular to a terminal management method based on a two-dimensional code. The software management two-dimensional code can be produced by utilizing the hardware serial number and the identity identification information of the computer equipment, and when the software is started, the management server compares and checks the hardware serial number and the identity identification information, so that the cost for cracking the machine code is improved by utilizing the two-dimensional code technology, the authorization of computer equipment personnel bound on a client site (outside an enterprise) is strictly controlled, in addition, the client can conveniently feed back the product requirement, the terminal management can be realized, the effective protection on a software system in the terminal is realized, the application range is wide, and the safety and the reliability are realized.
Description
Technical Field
The invention relates to a terminal management method, in particular to a terminal management method based on a two-dimensional code.
Background
At present, most of commercial software and shared software adopt a registration code authorization mode to ensure that the software is not stolen so as to ensure the benefits of the software. Although some versions of many commonly used software systems have been hacked by others, the manner in which registration codes are authorized is an effective means of protecting the software system itself for the particular industry of software.
A so-called registration code is generally formed by a certain algorithm (i.e., a registrar) using a unique serial number of computer hardware as a registration source. A general program records a registration code by setting a global variable in the program.
However, the serial number and the registration code in the prior art can be bypassed, forged, cracked and the like by a certain technical means; in addition, a malicious person may fraudulently cheat the user through the registrar, causing a loss to the user and also a loss of reputation to the product provider.
In addition, when an enterprise product binds computer equipment, two scenes exist: 1. the computer installs and binds the computer equipment from the inside of the enterprise; 2. the customer site has a computer (outside the enterprise) self-contained, and the installation engineer on the customer site performs the product binding work.
Therefore, how to protect a software system more effectively is a technical problem to be solved urgently.
Disclosure of Invention
The invention aims to overcome the defects in the prior art, and provides a terminal management method based on two-dimensional codes, which can realize terminal management and achieve effective protection of a software system in a terminal, and has the advantages of wide application range, safety and reliability.
According to the technical scheme provided by the invention, the terminal management method based on the two-dimensional code comprises the following steps:
step 1, providing computer equipment for installing software to be protected and a management server for managing the computer equipment; in the computer equipment, generating a software management two-dimensional code by using a hardware serial number of the computer equipment and identification information of personnel related to the computer equipment, wherein the software management two-dimensional code is associated with software to be protected, and the computer equipment transmits the hardware serial number and the identification information for generating the software management two-dimensional code to a management server to be stored by the management server;
step 2, when software of the software management two-dimensional code is started on computer equipment with the software management two-dimensional code, jumping out of the software management two-dimensional code so as to control the starting of the software by using the software management two-dimensional code;
step 3, scanning or identifying the software management two-dimensional code by using the user terminal, connecting the computer equipment with a management server after scanning or identifying the software management two-dimensional code, and transmitting a hardware serial number of the computer equipment and identity identification information input by the user terminal to the management server;
and 4, the management server respectively verifies the received hardware serial number and the received identity identification information by using the stored hardware serial number and the stored identity identification information, if the verification is passed, the management server allows the software to start, and otherwise, a prompt needing to be activated is output.
In step 1, the hardware serial number of the computer device comprises one or more of a serial number of a mainboard, a serial number of a network card and a serial number of a hard disk; the identity identification information comprises one or more of an identity card number, a mobile phone number and a employee number.
In step 1, the specific process of generating the software management two-dimensional code comprises the following steps:
step 1.1, encrypting a hardware serial number and identity identification information of the computer equipment by using a preset encryption key and an encryption algorithm to generate a license information character string;
and step 1.2, packaging the license information character string into a two-dimensional code protocol according to a preset protocol rule, and converting the two-dimensional code protocol into a software management two-dimensional code by using a preset two-dimensional code generating component.
In step 3, the user terminal for scanning the code or identifying the software management two-dimensional code comprises a smart phone, a smart tablet and/or the computer equipment for generating the software management two-dimensional code.
In step 3, the computer equipment can allow the user feedback information to be written in, and transmits the user feedback information to the management server along with the hardware serial number and the identification information input by the user terminal, and the management server stores the received user feedback information in association with the hardware serial number.
The invention has the advantages that: the software management two-dimensional code can be produced by utilizing the hardware serial number and the identity identification information of the computer equipment, and when the software is started, the management server compares and verifies the hardware serial number and the identity identification information, so that the cost for cracking the machine code is improved by utilizing the two-dimensional code technology, the authorization of computer equipment personnel bound on a client site (outside an enterprise) is strictly controlled, in addition, the client can conveniently feed back the product requirement, the terminal management can be realized, the effective protection on a software system in the terminal is realized, the application range is wide, and the safety and the reliability are realized.
Detailed Description
The present invention will be further described with reference to the following specific examples.
In order to realize terminal management and achieve effective protection of a software system in a terminal, the terminal management method comprises the following steps:
step 1, providing computer equipment for installing software to be protected and a management server for managing the computer equipment; in the computer equipment, generating a software management two-dimensional code by using a hardware serial number of the computer equipment and identification information of personnel related to the computer equipment, wherein the software management two-dimensional code is associated with software to be protected, and the computer equipment transmits the hardware serial number and the identification information for generating the software management two-dimensional code to a management server to be stored by the management server;
specifically, the computer device and the management server may specifically adopt the existing commonly used form, generally, the computer device is a hardware device installed and used to be protected, the management server is a server related to the software to be protected, the management server can control the running of the software on the computer device, and the specific coordination relationship between the management server, the computer device and the software to be protected is consistent with the existing one, and is specifically known to those skilled in the art, and is not described herein again.
The hardware serial number of the computer equipment comprises one or more of a serial number of a mainboard, a serial number of a network card and a serial number of a hard disk; the identity identification information comprises one or more of an identity card number, a mobile phone number and a employee number. In the embodiment of the present invention, the person related to the computer device specifically refers to a person using the computer device, a person managing the computer device, or other persons specified to be related in practice, and is specifically known by those skilled in the art, and will not be described herein again.
The software management two-dimensional code is associated with software to be protected, specifically, when the software is started, the associated software management two-dimensional code can automatically jump out, or the software management two-dimensional code is directly displayed on a starting interface of the software.
Specifically, the specific process for generating the software management two-dimensional code includes the following steps:
step 1.1, encrypting a hardware serial number and identity identification information of the computer equipment by using a preset encryption key and an encryption algorithm to generate a license information character string;
in the embodiment of the invention, the encryption step comprises: encrypting the read hardware serial number of the computer equipment and the identity identification information of the mobile phone number, the employee number or the employee enterprise mailbox combination of the implementing personnel into a permission information character string by using a preset encryption key and an encryption algorithm; specifically, there are various processing schemes for encrypting the verified combined authentication information by using a preset encryption key and an encryption algorithm, for example, the encryption algorithm may adopt a 3DES symmetric encryption algorithm, and the preset encryption key is a 24-bit key required by adopting the 3DES symmetric encryption algorithm, which can be generated and provided by a designated system or a manager.
And step 1.2, packaging the license information character string into a two-dimensional code protocol according to a preset protocol rule, and converting the two-dimensional code protocol into a software management two-dimensional code by using a preset two-dimensional code generating component.
In the embodiment of the invention, the encrypted product information is encapsulated into a two-dimensional code protocol according to a preset protocol rule, wherein the two-dimensional code protocol can adopt an XML message, and the specific format is as follows:
the encryption mode of < R > X </T > product type </T > product code </P > product name </M > implements personnel code </S > </D > customer area code </D > </R >;
wherein, R represents a two-dimension code protocol message root node; x represents an encryption mode, and the tag value of the product two-dimensional code is 1, which represents a 3DES encryption algorithm; t represents the product type, the tag value of the product two-dimensional code is the product type after 3DES encryption, and the encrypted product is only a numerical value or a letter; p represents a product code, the tag value of the product two-dimensional code is a product code encrypted by 3DES, and the product code is only a numerical value or a letter after encryption; m represents the product name, the tag value of the product two-dimensional code is the product name after 3DES encryption, and the product name is only a numerical value or a letter after encryption; s represents the implementer code, the tag value of the product two-dimensional code is the implementer code encrypted by 3DES, and the two-dimensional code is only a numerical value or a letter after encryption; d represents the client area code, the tag value of the special product two-dimensional code is the client area code encrypted by 3DES, and the encrypted value is only a numerical value or a letter.
And converting the two-dimension code protocol into a two-dimension code picture by using a preset two-dimension code generating component. The preset two-dimensional code generating component can be selected in various embodiments, for example, an open source component ZXing based on Google corporation can be selected, and a quick response matrix code is generated according to the text content of a two-dimensional code protocol, so that a software management two-dimensional code is generated, and the software management two-dimensional code is displayed for a user to scan.
Step 2, when software of the software management two-dimensional code is started on computer equipment with the software management two-dimensional code, jumping out of the software management two-dimensional code so as to control the starting of the software by using the software management two-dimensional code;
in the embodiment of the invention, when the software management two-dimensional code is jumped out or displayed, the key management two-dimensional code needs to be subjected to code scanning, identification and other processing, and the subsequent software can be started and run.
Step 3, scanning or identifying the software management two-dimensional code by using the user terminal, connecting the computer equipment with a management server after scanning or identifying the software management two-dimensional code, and transmitting a hardware serial number of the computer equipment and identity identification information input by the user terminal to the management server;
in the embodiment of the invention, the user terminal for scanning the code or identifying the software management two-dimensional code comprises a smart phone, a smart tablet and/or the computer equipment for generating the software management two-dimensional code. Generally, after scanning or recognizing the software management two-dimensional code, identification information needs to be input, and at the same time, the computer device transmits a hardware serial number of the computer device and the identification information input by the user terminal to the management server, so that the management server performs a subsequent verification step. Specifically, after the two-dimensional code is managed by scanning or identifying the software, the software can automatically collect the hardware serial number of the computer equipment, so that the hardware serial number and the identification information input by the user terminal are transmitted to the management server under the condition that the hardware serial number of the current computer equipment is not required to be input.
And 4, the management server respectively verifies the received hardware serial number and the received identity identification information by using the stored hardware serial number and the stored identity identification information, if the verification is passed, the management server allows the software to start, and otherwise, a prompt needing to be activated is output.
As can be seen from the above description, the management server stores in advance a hardware serial number of the computer device and identification information used when generating the software management two-dimensional code. After receiving a hardware serial number of the computer equipment transmitted after the terminal equipment scans the code or identifies the software management two-dimensional code and identity identification information input by the user terminal, the management server needs to compare the hardware serial number and the identity identification information one by one, the management server allows the software to be started and run only after the comparison is passed, otherwise, the management server prohibits the software from being started and returns a prompt to the computer equipment to be activated.
In the embodiment of the invention, the hardware serial numbers are compared, so that the software can be prevented from being stolen or cracked for use, and when the identity identification information is compared and checked, non-related personnel can be prevented from using computer equipment.
When the system is specifically implemented, the computer equipment can allow user feedback information to be written in, the user feedback information is transmitted to the management server along with the hardware serial number and the identification information input by the user terminal, and the management server stores the received user feedback information in association with the hardware serial number. Of course, the user feedback information may also be written and fed back to the management server in the normal use of the software, and the specific manner may be selected according to actual needs, which is not described herein again.
Claims (5)
1. A terminal management method based on two-dimension codes is characterized by comprising the following steps:
step 1, providing computer equipment for installing software to be protected and a management server for managing the computer equipment; in the computer equipment, generating a software management two-dimensional code by using a hardware serial number of the computer equipment and identification information of personnel related to the computer equipment, wherein the software management two-dimensional code is associated with software to be protected, and the computer equipment transmits the hardware serial number and the identification information for generating the software management two-dimensional code to a management server to be stored by the management server;
step 2, when software of the software management two-dimensional code is started on computer equipment with the software management two-dimensional code, jumping out of the software management two-dimensional code so as to control the starting of the software by using the software management two-dimensional code;
step 3, scanning or identifying the software management two-dimensional code by using the user terminal, connecting the computer equipment with a management server after scanning or identifying the software management two-dimensional code, and transmitting a hardware serial number of the computer equipment and identity identification information input by the user terminal to the management server;
and 4, the management server respectively verifies the received hardware serial number and the received identity identification information by using the stored hardware serial number and the stored identity identification information, if the verification is passed, the management server allows the software to start, and otherwise, a prompt needing to be activated is output.
2. The two-dimensional code-based terminal management method of claim 1, wherein: in step 1, the hardware serial number of the computer device comprises one or more of a serial number of a mainboard, a serial number of a network card and a serial number of a hard disk; the identity identification information comprises one or more of an identity card number, a mobile phone number and a employee number.
3. The two-dimensional code-based terminal management method of claim 1, wherein: in step 1, the specific process of generating the software management two-dimensional code comprises the following steps:
step 1.1, encrypting a hardware serial number and identity identification information of the computer equipment by using a preset encryption key and an encryption algorithm to generate a license information character string;
and step 1.2, packaging the license information character string into a two-dimensional code protocol according to a preset protocol rule, and converting the two-dimensional code protocol into a software management two-dimensional code by using a preset two-dimensional code generating component.
4. The two-dimensional code-based terminal management method of claim 1, wherein: in step 3, the user terminal for scanning the code or identifying the software management two-dimensional code comprises a smart phone, a smart tablet and/or the computer equipment for generating the software management two-dimensional code.
5. The two-dimensional code-based terminal management method of claim 1, wherein: in step 3, the computer equipment can allow the user feedback information to be written in, and transmits the user feedback information to the management server along with the hardware serial number and the identification information input by the user terminal, and the management server stores the received user feedback information in association with the hardware serial number.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010714490.7A CN111860723A (en) | 2020-07-23 | 2020-07-23 | Terminal management method based on two-dimensional code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010714490.7A CN111860723A (en) | 2020-07-23 | 2020-07-23 | Terminal management method based on two-dimensional code |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111860723A true CN111860723A (en) | 2020-10-30 |
Family
ID=72950789
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010714490.7A Pending CN111860723A (en) | 2020-07-23 | 2020-07-23 | Terminal management method based on two-dimensional code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111860723A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112699422A (en) * | 2020-12-29 | 2021-04-23 | 湖北省楚天云有限公司 | Cloud platform terminal management method and system based on two-dimensional code |
CN112738059A (en) * | 2020-12-23 | 2021-04-30 | 迈普通信技术股份有限公司 | Terminal access validity verification method and device, electronic equipment and storage medium |
CN115865539A (en) * | 2023-03-03 | 2023-03-28 | 新云网科技集团股份有限公司 | Safety binding method, device, equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102685093A (en) * | 2011-12-08 | 2012-09-19 | 陈易 | Mobile-terminal-based identity authentication system and method |
CN105933353A (en) * | 2016-07-05 | 2016-09-07 | 北京万维星辰科技有限公司 | Method and system for realizing secure login |
US20180302221A1 (en) * | 2015-06-10 | 2018-10-18 | Feitian Technologies Co., Ltd. | Barcode security authentication method |
CN110611685A (en) * | 2019-10-30 | 2019-12-24 | 南宁市指搜信息技术有限公司 | Internet site login system based on intelligent equipment monitoring and user identity recognition |
CN110768839A (en) * | 2019-10-30 | 2020-02-07 | 南宁市指搜信息技术有限公司 | Third-party software authorization system based on intelligent device monitoring and user identity binding |
-
2020
- 2020-07-23 CN CN202010714490.7A patent/CN111860723A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102685093A (en) * | 2011-12-08 | 2012-09-19 | 陈易 | Mobile-terminal-based identity authentication system and method |
US20180302221A1 (en) * | 2015-06-10 | 2018-10-18 | Feitian Technologies Co., Ltd. | Barcode security authentication method |
CN105933353A (en) * | 2016-07-05 | 2016-09-07 | 北京万维星辰科技有限公司 | Method and system for realizing secure login |
CN110611685A (en) * | 2019-10-30 | 2019-12-24 | 南宁市指搜信息技术有限公司 | Internet site login system based on intelligent equipment monitoring and user identity recognition |
CN110768839A (en) * | 2019-10-30 | 2020-02-07 | 南宁市指搜信息技术有限公司 | Third-party software authorization system based on intelligent device monitoring and user identity binding |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112738059A (en) * | 2020-12-23 | 2021-04-30 | 迈普通信技术股份有限公司 | Terminal access validity verification method and device, electronic equipment and storage medium |
CN112699422A (en) * | 2020-12-29 | 2021-04-23 | 湖北省楚天云有限公司 | Cloud platform terminal management method and system based on two-dimensional code |
CN115865539A (en) * | 2023-03-03 | 2023-03-28 | 新云网科技集团股份有限公司 | Safety binding method, device, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108200050B (en) | Single sign-on server, method and computer readable storage medium | |
CN111860723A (en) | Terminal management method based on two-dimensional code | |
CN100419737C (en) | Application authentication system, secure device, and terminal device | |
EP1472583B1 (en) | Method for supporting single sign on | |
CN110149328B (en) | Interface authentication method, device, equipment and computer readable storage medium | |
CN108965222B (en) | Identity authentication method, system and computer readable storage medium | |
CN101305375A (en) | System and method for controlling distribution of electronic information | |
CN104756127A (en) | Secure data handling by a virtual machine | |
CN101689237A (en) | Activation system architecture | |
US20160337358A1 (en) | Method for encoding an access to a computer resource | |
EP3683703A1 (en) | System for authentification | |
US20010048359A1 (en) | Restriction method for utilization of computer file with use of biometrical information, method of logging in computer system and recording medium | |
CN112464212A (en) | Data authority control reconstruction method based on mature complex service system | |
CN112887340B (en) | Password resetting method and device, service management terminal and storage medium | |
CN109598104A (en) | Soft ware authorization based on timestamp and secret authentication file protects system and method | |
US8668139B2 (en) | Method of protecting an individual's privacy when providing service based on electronic tag | |
US20030051145A1 (en) | System for issuing and using secure cards | |
JPH10260939A (en) | Client machine authentication method of computer network, client machine, host machine and computer system | |
RU2311676C2 (en) | Method for providing access to objects of corporate network | |
US20080195545A1 (en) | Method, system, and computer program product for using a personal communication device to obtain additional information | |
CN108965335B (en) | Method for preventing malicious access to login interface, electronic device and computer medium | |
KR100753898B1 (en) | System and method for login using an one time use password, smartcard having an one time use password process | |
JP2007179357A (en) | Method for installing computer program | |
JP2005065035A (en) | Substitute person authentication system using ic card | |
JP4565827B2 (en) | Information processing apparatus for reading ID tag, program for reading ID tag, and program for writing to ID tag |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |